StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Role of IP Address or Internet Protocol - Assignment Example

Cite this document
Summary
The author of the paper "The Role of IP Address or Internet Protocol" states that an IP address or internet protocol is denoted as a numerical tag allocated to each device like a computer or printer that participates in any computer network using the IP for communication. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
The Role of IP Address or Internet Protocol
Read Text Preview

Extract of sample "The Role of IP Address or Internet Protocol"

IP internetworking assignment Introduction An IP address or internet protocol is de d as a numerical tag allocated to each devicelike a computer or printer that participates in any computer network using the IP for communication. An IP address is said to serve two key functions including location addressing and network or hosting interface identification. The role of the IP is indicated as the name offers what we want, the address directs us to its location, and the route enables us to get it. The IP designers stated the IP address to be a 32-bit number, where the system identified as internet protocol version 4 (ipv4) is still used even today. However, as a result of the gigantic growth in the internet industry and the forecasted exhaustion of the available addresses, a better IP version (ipv6) that uses 128-bit in 1995 was developed. The addresses of the IP are binary numbers, but are mainly displayed in notations that human-readable like 172.12.243.1 for the IPv4 and for IPv6 as 2001:db8:0:1234:0:567:8:1 and mainly stored as text files. The use of IPv4 is that it limits the addressing space to about 2^32 mainly unique addresses. IPv4 also reserves addresses for particular purposes like multicast addresses (~270 million addresses) or private networks (~18 million addresses). The representation of IPv4 is mainly in dot-decimal notations consisting of four decimal numerics, ranging from 0 to 255 and separated by dots like 172.16.254.1. Every part of the four numerics symbolizes a collection of 8 bits attached to the address. In technical writings, various addresses of the IPv4 can be presented in octal, hexadecimal, or binary representations. During the early phases of IP development, network administrators clustered the IP addresses to two parts, which were the host number and network number portion. The most crucial eight bits in the address was the network number, while the rest were denoted as host identifier or rest field and were associated with hosting numbering in a network. Due to the growth in technology and internet, the method was outdated and researchers introduced the architecture of the classy network. The design of the classful network allowed for the design of the fine-grained sub network and an increased number of the individual network assignments. The starting three bits of the most crucial octet in the IP address was stated to be a class. There were three classes defined A, B, and C addressing of the universal unicast. Depending on the derived class, the network identification is based on the octet boundary sections associated with the entire address. The classes are as follows in the table below: Class Leading bits Size of network number bit field Size of rest bit field Number of networks Addresses per network Start address End address A 0 8 24 128 (27) 16,777,216 (224) 0.0.0.0 127.255.255.255 B 10 16 16 16,384 (214) 65,536 (216) 128.0.0.0 191.255.255.255 C 110 24 8 2,097,152 (221) 256 (28) 192.0.0.0 223.255.255.255 The early network design that envisioned communications with the relevant internet host as a way of global end-to-end connectivity wanted that the IP addresses be exclusively entitled to a particular device or computer. However, it was known that it was not that necessary since private networks were developed and since there needed the conservation of the public address space. Computers with no internet connections and communicate to each other through TCP/IP should not have globally exclusive IP addresses (Cinque, 2002). There are three IPv4 ranges specifically reserved for private networks. The three addresses are not internet routed and their use must not be coordinated by the IP address registry. Today, such private networks mainly bond to the internet via the network address translation. IANA-reserved private IPv4 network ranges Start End No. of addresses 24-bit block (/8 prefix, 1 × A) 10.0.0.0 10.255.255.255 16777216 20-bit block (/12 prefix, 16 × B) 172.16.0.0 172.31.255.255 1048576 16-bit block (/16 prefix, 256 × C) 192.168.0.0 192.168.255.255 65536 For assigning the IP addresses for use in networks, the best IP address to use would be 10.10.0.0/16. The use of this IP address makes it easier for it to have an extensive space, which will make it possible to uphold more address space. The use of VLAN is very necessary for any organization. A VLAN refers to a rational segmentation of a switch making it possible for grouped nodes to act as is if they live on their own corporal network. For any organization not utilizing VLAN, we can state that it might be running on a flat network. A flat network denotes a network plan where the network designer naively daisy chains hubs and switches together, thus creating a single large network, which encompass hundreds or thousands of devices to a broadcast domain (Serrat & Galis, 2003). From a developer’s point of view, this an idea that is insane since control traffic and broadcast can crush the network. In an actual world manufacture, multi-access network like Ethernet, one can notice the network performance degrade when it reaches 400+ hosts on a specified subnet. The most widespread network size is the /24 net mask that can address about 254 host IP addresses that are usable. The method to creating a network that exceeds 400+ nodes is the use of VLAN. VLAN partitions a physical switch to multiple isolated LAN to reduce communication of one VLAN to another unless via a router. VLAN’s driving factor is to organize the layer 2 segment size so that control traffic and broadcast do not overpower the network segment. To develop a VLAN, an Ethernet switch needs to be configured to a cluster ports to numbered VLANs. For example, if packets land on port # 9 (VLAN # 1), the switch has to push all those packets to all other ports associated with VLAN # 1. The easy, fixed approach is referred to as port-based VLAN. IEEE 802.1Q illustrates how to add a VLAN priority (1-7) and the identifier (1-4096) to every packet’s header. Tagging makes it possible for 802.1Q capable machines like layer 3 and layer 2 routers, switches and firewall impose VLAN segregation down the packet’s whole path (Chou & Schaar, 2007). VLAN makes it possible to develop LAN workgroups, which are sovereign of physical location. Stations that participate in any VLAN could be dispersed throughout different buildings, floors, or even cities. Workgroup members may be removed or added and ACLs can be altered via centrally-managed machine configurations. In addition to decreasing broadcast operating cost, VLAN tags could be articulated to offer one workgroup’s traffic precedence over the other, and to authorize members to reach network and hear traffic resources, which must be available to them and not others. Optimization of WAN is a compilation of techniques for growing data-transfer efficiencies through wide-area network. The various TCP measures include latency, throughput, protocol optimization, congestion, and bandwidth requirement, as evident in dropped packets. Additionally, WAN can be put with regards to the distance linking data transferred amounts and endpoints. There are various techniques that are implemented for WAN optimization including data compression techniques, deduplication, VPN tunneling and caching (Dixit & Prasad, 2003). IP ADDRESSING TABLE Location Number of IP Addresses Required Address Block Assigned Summarized Address San Francisco 1290 /24 192.168.0.1 Denver Region Denver Campus 441 /24 255.255.255.0 Remote Office 1 28 /27 255.255.255.230 Remote Office 2 35 Houston Region Houston Campus 329 /23 255.255.255.0 Remote Office 3 21 /18 255.255.192.0 Executive Summary XUMUC needs to clearly restructure it internet network as a way of reducing traffics. Traffics leads to the slowing down of any network thus making it fail to serve the purpose intended. The use of VLAN is very necessary for any organization XUMUC included and for it to implement the use of VLAN, would lead to less traffic. The use of WAN Optimization is a compilation of techniques for growing data-transfer efficiencies. The use of VLAN makes it possible for any organization to enhance and provide its data in the most efficient and elegant manner to suit the demands of the user. Conclusion The implementation and design of IP networks has a significant role in the development of an IT infrastructure in each organization. The development of An IP network that is unified in any association needs to provide IT security in the organization and access every workstation associated with the network to the email, internet, or any IT service. The application of VLAN should be implemented in any organization as a way of reducing traffic since the use of a flat network leads to traffic. References Ammann, P. T. (2000). Managing dynamic IP networks. New York: McGraw-Hill. Chou, P. A., & Schaar, M. . (2007). Multimedia over IP and wireless networks: Compression, networking, and systems. Amsterdam: Elsevier/Academic Press. Cinque, G. (2002). The cartography of syntactic structures: Vol. 1. Oxford [u.a.: Oxford Univ. Press. Dixit, S., & Prasad, R. (2003). Wireless IP and building the mobile Internet. Boston, MA: Artech House. Malhotra, R. (2002). IP routing. Sebastopol, CA: OReilly. Muller, N. J. (2000). IP convergence: The next revolution in telecommunications. Boston: Artech House. Prasad, A., & Prasad, N. (2005). 802.11 WLANs and IP networking: Security, QoS, and mobility. Boston: Artech House. Serrat, J., & Galis, A. (2003). Deploying and managing IP over WDM networks. Boston: Artech House. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IP Internetworking Assignment Example | Topics and Well Written Essays - 1250 words”, n.d.)
IP Internetworking Assignment Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/logic-programming/1665533-ip-internetworking-assignment
(IP Internetworking Assignment Example | Topics and Well Written Essays - 1250 Words)
IP Internetworking Assignment Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/logic-programming/1665533-ip-internetworking-assignment.
“IP Internetworking Assignment Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/logic-programming/1665533-ip-internetworking-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Role of IP Address or Internet Protocol

Internet Protocol Version 4 and It Next Generation IP

This report ''internet protocol Version 4 and It Next Generation IP'' is about two Internet protoco versions, such as internet protocol Version 4 and internet protocol Version 6.... Likewise, network layer incorporates addressing information and control information that enables data packets to be routed within the computer network ("internet protocol Version 6.... Moreover, IP version 6 is also considered or called as the next generation IP, as specified by the IEFT: RFC 2460 ("internet protocol Version 6....
14 Pages (3500 words) Report

Complete Computer Network Infrastructure for a Real or Ficticious Business

After defining the specification, we will address network devices along with switch and router deployment.... Sub netting will play a dominant role in breaking down global ip addresses into local ip addresses for each node on the network.... Moreover, we will define all the associated servers that will play a vital role in synchronizing data with remote offices in this scenario....
20 Pages (5000 words) Research Paper

Resolution to the Security Vulnerabilities Facing Voice Over Internet Protocol Users

This dissertation "Resolution to the Security Vulnerabilities Facing Voice Over internet protocol Users" surveys the literature on VoIP or voice over internet protocol telephony application.... While most are familiar with modern cell phone and smartphone technology, voice over internet protocol, or VoIP, is also a technological improvement, with regards to telephoning that should be considered.... The research reveals Session Initiation protocol or SIP as the best protocol given that it is easier to secure and sustain the quality of VoIP service....
39 Pages (9750 words) Dissertation

Advanced Routing Protocols

the number of ip hosts traversed to reach the destination).... Dynamic Routing protocols are of two types – Distance Vector Routing protocol and Link State Routing protocol.... istance Vector Routing protocol: This protocol decides the cost of reaching a destination based on the number of hops to the destination (i.... ink State Routing protocol: This protocol calculates the metrics against each link by tracking the parameters like link type, speed & current utilization level whereby some of the parameters are default and the others are defined by the network administrator....
27 Pages (6750 words) Essay

Network Access Protocols, Data Delivery

(Hall, 2000)The internet protocol is a common internetwork protocol, which is used in x-stream.... This HTTP protocol, to govern the way messages are transported between the x-stream server and the client, relies on other protocols.... (Hall, 2000)The transport protocol, which manages individual conversation between the x-stream servers and client, is the Transmission Control protocol (TCP).... Packets are taken from ip and are formatted by data-link management protocols to be transferred over the media (Gaffin, 2007)....
8 Pages (2000 words) Essay

Transmission Control Protocol in Network

The first section describes the role of TCP/UDP ports, the second section associates TCP/IP applications and protocols with ports.... the role of the DNS service is the resolution of hostnames like corresponding IP addresses.... The author states that the naming is based on two crucial protocols within it: the Transmission Control Protocol (TCP) plus the internet protocol (IP).... he role of the DNS service is the resolution of hostnames like www....
3 Pages (750 words) Essay

Communication Protocols

The author takes into account that a communication protocol is essential in defining the rules for sending blocks of data (protocol data unit-PDU) from one node in a network to another node.... protocol refers to a set of rules crucial in governing the format as well as the meaning of frames, packets, or messages exchanged by peer entities within the relevant layer.... Each protocol has two critical elements: syntax and semantics....
12 Pages (3000 words) Essay

The Spoofing of Internet Protocol Addresses

The paper "The Spoofing of internet protocol Addresses" is an outstanding example of an essay on information technology.... The paper "The Spoofing of internet protocol Addresses" is an outstanding example of an essay on information technology.... The paper "The Spoofing of internet protocol Addresses" is an outstanding example of an essay on information technology.... IP address spoofing or simply IP spoofing is a process that involves the replacement of the internet protocol (IP) address of a computer system sending IP packets with another's IP address to conceal its identity or to mimic the other system....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us